You are on page 1of 2

JAYPEE INSTITUTE OF INFORMATION TECHNOLOGY

Electronics and Communication Engineering


Convergence & Next Generation Networks (Code: 19B12EC413)
Tutorial Sheet: 3

Q1. [CO1]
Determine the value of following expressions. List all computational steps.
a) 8115 mod 11
b) [5713 + 6013] mod 19
Ans. (a) 1 mod11 (b) 14 mod 19
Q2. [CO1]
Determine additive inverse pairs of Z11.
Ans. <0, 0> <1, 10> <2, 9> <3, 8> <4, 7> <5, 6>
Q3. [CO1]
Encrypt ‘WORK’ using encryption function c = (m + K) mod 26 and the key K = 11.
Ans. HZCV
Q4. [CO1]
Find multiplicative inverse pairs of Z14.
Ans. <1, 1> <3, 5> <9, 11> <13, 13>
Q5. [CO1]
Evaluate
a) 8 x 7-1 mod 12
b) (3-1 +6) x 2-1 mod 7
Ans. (a) 8 mod 12 (b) 2 mod 7
Q6. [CO1]
The most frequent letter in a ciphertext is C. The encryption function is c = (m + K) mod 26.
Determine the key K.
Ans. 28
Q7. [CO1]
A generalization of shift cipher known as affine cipher is c = (am + b) mod 26. Encrypt the
word ARMY for a = 3 and b = 5.
Ans. FEPZ
Q8. [CO1]
Affine cipher c = (am + b) mod 26 maps I to P and F to O. What will be the ciphertext of
letter L?
Ans. Q
Q9. [CO1]
Encrypt JAYPEE INSTITUTE using transposition cipher with key K = 3214.
Ans, YIIEAETTJESUPNTX

You might also like